Re: Network address associated with fingerprint of the node's public key?
2012-03-01 07:01:17 GMT
On 02/28/2012 07:59 PM, Wojciech Zabolotny wrote: >> Maybe a distributed address distribution could help. Or just switch to IPv6 >> and choose your IP based on the MAC address of your WLAN card (or just with >> a random suffix). >> > Unfortunately this can be spoofed as well. I was just thinking about an address selection algorithm that can run without a central instance. > OK. So probably it should include generation of symmetric keys for exchange of > packets between each pair of nodes. The challenge-response mechanism should > be used only when establishing the communication between those nodes. > (As you describe it below.) You also need an authentication system for the mesh-wide flooding of messages of the routing protocol. Thats something which cannot be done easily with symmetric crypto. > In the simplest version, the IP could be just the appropriate number > of bytes from the fingerprint of the key. So the asymmetric key is generated > first, then the fingerprint is calculted and IP is obtained from it. Of > course in this case the IP is somehow randow, however in my experiments > (up to ca. 20 node) the olsr protocol could handle fully random IP addresses > (well, I don't know how it would scale up for a network consisting of e.g. > 200 nodes covering a small town.) Okay. OLSR don't do better or worse with randomized IPs. It doesn't care. ^^(Continue reading)